U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Site Specific Perimeter Protection

NCJ Number
100975
Journal
Security Management Volume: 30 Issue: 2 Dated: (February 1986) Pages: 47-51
Author(s)
C E Higgins
Date Published
1986
Length
5 pages
Annotation
This article describes the steps in designing an intrusion detection system appropriate for a particular site.
Abstract
First, a threat analysis must determine the nature of the threat to the assets needing protection, including probable operational methods, technical equipment likely to be used, and the effort likely to be mounted to defeat security equipment. Next, the security manager must establish the protection and operational requirements of the security system. These requirements should be based on the following criteria: the threat analysis; the installation configuration, construction, topography, and environment; and the facility's operational functions and schedules. The third and most critical step is to select the intrusion detection equipment that will satisfy the security requirements. Factors to be considered in selecting exterior detectors include the terrain along the perimeter, large animals in the vicinity likely to cross the perimeter, the length of the detection zone, the climate, and the nature of facility activities across the site perimeter. Outdoor detectors should have their electronic processor and power supply protected by a weatherproof enclosure. The final step is to implement the security system design and establish a maintenance plan.

Downloads

No download available

Availability